Robust Median Filtering Detection Based on Filtered Residual

  • Anjie Peng
  • Xiangui Kang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7809)

Abstract

In multimedia forensics, exposing an image’s processing history draws much attention. Median filtering is a popular noise removal tool, which has been used as a popular anti-forensics tool recently. An image is usually saved in a compressed format such as the JPEG format. While the detection of median filtering from a JPEG compressed image is difficult because typical filter characteristics are suppressed by JPEG quantization and block artifacts. In this paper, we introduce a novel forensic trace – median filter residual. Median filtering is first applied on a test image, and the difference between the initial image and the filtered output image is called the median filter residual. The filtered residual is used as the forensic fingerprint. Thus, the interference from the image edge and texture which is regarded as a major limitation of the existing forensic methods can be reduced. Experimental results on a large image database show that the proposed method is very robust to JPEG post- compression, and achieves much better performance than the existing state-of-the-art works.

Keywords

Digital image Forensics Median filter residual Transition probability 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kirchner, M., Fridrich, J.: On detection of median filtering in digital images. In: Proc. SPIE, Electronic Imaging, Media Forensics and Security II, vol. 7541, pp. 1–12 (2010)Google Scholar
  2. 2.
    Yuan, H.: Blind Forensics of Median Filtering in Digital Images. IEEE Trans. Inf. Forensics Security 6(4), 1335–1345 (2011)CrossRefGoogle Scholar
  3. 3.
    Cao, G., Zhao, Y., Ni, R., Yu, L., Tian, H.: Forensic detection of median filtering in digital images. In: Proc. 2010 IEEE Int. Conf. Multimedia and Expo. 2010, pp. 89–94 (2010)Google Scholar
  4. 4.
    Popescu, A.C., Farid, H.: Exposing digital forgeries by detecting traces of re-sampling. IEEE Transactions on Signal Processing 53(2), 758–767 (2005)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Luo, W.Q., Huang, J.W., Qiu, G.P.: JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Security 5(3), 480–491 (2010)CrossRefGoogle Scholar
  6. 6.
    Stamm, M., Liu, K.J.R.: Forensic estimation and reconstruction of a contrast enhancement mapping. In: International Conf. on Acoustics, Speech and Signal Processing, Dallas, Texas, USA (2010)Google Scholar
  7. 7.
    Stamm, M.C., Ray Liu, K.J.: Anti-Forensics of Digital Image Compression. IEEE Trans. Inf. Forensics Security 6(3), 1050–1065 (2011)CrossRefGoogle Scholar
  8. 8.
    Dirik, A.E., Memon, N.: Image tamper detection based on demosaicing artifacts. In: International Conference Proceedings on Image Processing, Cairo, pp. 1497–1500 (2009)Google Scholar
  9. 9.
    Kirchner, M., Bohme, R.: Hiding traces of resampling in digital images. IEEE Trans. Inf. Forensics Security 3(4), 582–592 (2008)CrossRefGoogle Scholar
  10. 10.
    Ker, A.D., Bohme, R.: Revisiting weighted stego-image stegoanalysis. In: Proceedings of SPIE, Electronic Imaging: Security, Forensics, Steganography and Watermarking of Multimedia Contents X, vol. 6819, p. 5 (2008)Google Scholar
  11. 11.
    Bovik, A.C.: Streaking in median filtered images. IEEE Transactions on Acoustics, Speech and Signal Processing 35(4), 493–503 (1987)CrossRefMATHGoogle Scholar
  12. 12.
    Swaminathan, A., Wu, M., Liu, K.J.: Digital image forensics via intrinsic fingerprints. IEEE Trans. Inf. Forensics Security 3(1), 101–117 (2008)CrossRefGoogle Scholar
  13. 13.
    Chuang, W.H., Swaminathan, A., Wu, M.: Tampering identification using empirical frequency response. In: Proc. IEEE Int. Conf. Acoust., Speech and Signal Processing, pp. 1517–1520 (2009)Google Scholar
  14. 14.
    Schaefer, G., Stich, M.: UCID-An uncompressed color image database. In: Proceedings of SPIE, Storage and Retrieval Methods and Applications for Multimedia, pp. 472–480 (2004)Google Scholar
  15. 15.
    Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology 2, 27:1–27:27 (2011)Google Scholar
  16. 16.
    Pevý, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Security 5(2), 215–224 (2010)CrossRefGoogle Scholar
  17. 17.
    Shi, Y.Q., Chen, C.-H., Chen, W.: A Markov Process Based Approach to Effective Attacking JPEG Steganography. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 249–264. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  18. 18.
    Zo, D., Shi, Y.Q., Su, W., Xuan, G.: Steganalysis based on Markov model of thresholded prediction-error image. In: Proc. IEEE Int. Conf. Multimedia and Expo., Toronto, Canada, July 9-12, pp. 365–1368 (2006)Google Scholar
  19. 19.
    Chen, C., Ni, J., Huang, R., Huang, J.: Blind median filtering detection using statistics in difference domain. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol. 7692, pp. 1–15. Springer, Heidelberg (2013)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Anjie Peng
    • 1
    • 2
  • Xiangui Kang
    • 1
    • 2
  1. 1.School of Information Science and TechnologySun Yat-Sen UniversityGuangzhouChina
  2. 2.State Key Laboratory of Information Security (Institute of Information Engineering)Chinese Academy of SciencesBeijingChina

Personalised recommendations